Why Tech Companies Are Faltering to Keep Their Sustainability Commitments

Sustainability is a continuous struggle in IT. Despite concerted efforts, sustainability goals remain unmet and out of reach for a lot of companies. In this Delegate Roundtable, the panelists drills into the reasons for that. Read about it at Gestalt IT or watch the full discussion from the recent Storage Field Day here.


Preserving Data Through Centuries Without Hard Drives – Meet DNA Data Storage

DNA data storage subverts the conventional technologies, and creates a new kind of hierarchy that breaks barriers of data overload. Watch SNIA present this new technology at the recent Storage Field Day event here on the site. For a quick read, check out the article on DNA Data Storage at Gestalt IT.


Cracking Down on Ransomware With the New AI-Based CTERA Ransom Protect

The volume of ransomware attacks has touched new heights in 2023. Organizations need several lines of defense to protect themselves from reckless attackers trying to steal from private data. CTERA recently launched the new CTERA Ransom Protect, a solution designed to track and respond to threats within 30 seconds of attack. Read about it at Gestalt IT or watch the demo here on the site.


Solidigm Right-Sizes SSDs for Write-Intensive Workloads With the New D7-P5810

In this Gestalt IT article, Sulagna Saha delves into Solidigm’s Storage Field Day announcement of their new D7-P5810 SLC SSD. Recognizing the evolving demands for superior performance and cost-efficiency in storage solutions, Solidigm’s D7-P5810 strikes an impressive balance with ultra-high endurance and supreme cost efficiency, making it ideal for accelerating write-intensive workloads. Additionally, it outperforms several competitors in its league, delivering 2x the performance, and provides SCM performance at just 20% of the cost of existing technologies, presenting a compelling new offering in the storage tech landscape.


Modernizing Aging Legacy Systems Without Cost Creep With AMD

This article by Sulagna Saha explores AMD’s VMware Architecture Migration Tool (VAMT) developed in collaboration with VMware. Addressing the critical need for seamless infrastructure upgrades to evade the “technical debt” of legacy systems, VAMT is a comprehensive tool that offers a swift, efficient, and automated approach to cold migration of machines between different architecture types. By automating the entire migration life cycle and providing customized control over migration tasks, VAMT represents a remarkable solution to drive the modernization of enterprise infrastructure with minimal disruption.


Rout Intruders With All New VMware NSX+ Network Detection and Response Service

In this Gestalt IT article, Sulagna Saha delves into the complexity of modern cyber threats and the rising need for enhanced cybersecurity. Discussing the issue of lateral movement in attack chains, Saha emphasizes the importance of total visibility to defeat rogue network invaders. VMware’s newly launched Network Detection and Response (NDR) service within the NSX+ suite, presented at Tech Field Day Extra at VMware Explore, promises exactly this kind of visibility, enabling quick detection and elimination of threats.


Adopting a Standard Operating Format in Multi-Cloud With VMware NSX+

Sulagna Saha discusses VMware’s NSX+ in this article following their presentation at Tech Field Day Extra at VMware Explore, noting its ability to simplify transitions into a multi-cloud environment. NSX+ serves as a comprehensive solution for multi-cloud networking and security delivered as a service, unifying fragmented policies and operations, ensuring consistent security controls, and simplifying migration. Ultimately, NSX+ aims to address the increasing demand for consistent operation, promising comprehensive cross-cloud visibility, multi-tenancy, persistent security, and centralized operations.


Smart Migration With VMware HCX+

Gestalt IT takes a look at VMware’s HCX+ following their Tech Field Day Extra presentation at VMware Explore. HCX+ is designed to streamline workload migration in the multi-cloud environment. The tool seeks to eliminate uncertainty and chaos from the migration process, allowing companies a swift transition to their first migration. HCX+ offers a “bird’s eye view” on multi-cloud estates for consolidated management and higher operational clarity, transforming the normally cumbersome process of migration into a simplified and efficient endeavor.


Cloud-Style Networking With Nile Service Block

Networking has become increasingly problematic with the growing heterogeneity of assets. At the recent Networking Field Day event, Nile presented the Nile Service Block that provides network as-a-service making everyday operations a breeze. Read about it at Gestalt IT or watch the demos here on the Tech Field Day website.


Accelerated Model Training With Broadcom Jericho-3ai and Tomahawk Family

This Gestalt IT article highlights Broadcom’s specialized solutions for AI processing, which address the challenges faced by enterprises in their AI/ML initiatives. These solutions offer fabric-based networking with receiver-based or endpoint-based scheduling, bypassing issues such as flow collision, link failure, and traffic oversubscription. Watch the demos of Broadcom’s Scheduled Fabric Solutions from Networking Field Day for a more detailed understanding.


Getting Past the Barriers of Cross-Domain Automation With Anuta Networks’ ATOM

In this Gestalt IT article, we consider how Anuta Networks’ Anuta ATOM overcomes the challenges of automation and enables its widespread adoption in businesses. Anuta ATOM’s closed-loop automation solution addresses these hurdles by offering unified cross-domain automation in hybrid cloud environments, supporting multiple vendors and platforms, and providing real-time visibility to operators. Check out the full article for more details and to see a demo of Anuta Networks’ new enhancements.


Beating the Alert Burnout With Forescout XDR

In this article, Sulagna Saha explores how Forescout’s XDR solution helps alleviate the alert fatigue burden faced by security operations centers (SOCs). By filtering out the noise and only delivering actionable notifications, Forescout XDR reduces the overwhelming volume of alerts faced by SOC teams, enabling them to focus on real threats. With its multi-vendor approach and ability to ingest and analyze data from various sources, Forescout XDR provides accurate detections and low false positives, improving the efficiency and effectiveness of security staff.


Performing On-Site Security Sweeps With NetAlly CyberScope

Site surveys are a great way to detect anomalies and track down vulnerabilities in a site network. But without a proper tool, it is a fool’s errand. NetAlly’s CyberScope, the world’s first handheld cybersecurity tool, helps mitigate risks by actively probing and scanning networks, categorizing devices, and providing real-time analytics and reports to enable effective security management. Read the review at Gestalt IT or watch the solution demo on the website.


Ramping Up Multicloud Visibility With Cisco Multicloud Defense

Enterprises’ journey to multi-cloud is often fraught with security concerns and deadlocks. As enterprises adopt multi-cloud strategies, the distribution of data and assets across various cloud providers can lead to reduced visibility, hindering security and impeding business resilience. Cisco Multicloud Defense addresses this challenge by providing unobstructed visibility and unified security across platforms, enabling consistent protection against threats and data exfiltration. Read about it at Gestalt IT or watch the demo live on the website.


Commvault Metallic ThreatWise – Discerning the First Signs to Quell an Attack Early

Early warning signs of a cyberattack exist only to the most discerning eye. Unlike traditional monitoring tools, Commvault Metallic ThreatWise utilizes a defense by deception strategy, deploying decoy assets in the environment to divert attackers and buy time for defenders to take action. With its lightweight and cost-efficient architecture, ThreatWise provides real-time insights on active and hidden threats, allowing organizations to detect and mitigate attacks at the earliest stages. Read about it at Gestalt IT or watch the demo here on the website.


Executing Zero-Trust Security and Building a Protective Perimeter With HashiCorp Boundary Enterprise

Identity-driven security is critical to countering attempts of credential harvesting. HashiCorp Boundary Enterprise brings the capability to secure on-demand access with granular identity controls to organizations in regulated industries. As organizations transition to cloud-based infrastructures, traditional network perimeters become less relevant, and identity becomes the primary focus of security. By standardizing remote user access and utilizing the principle of least privilege, HashiCorp Boundary enables organizations to secure their infrastructure while granting granular authorizations and creating a centralized access workflow. Read about it at Gestalt IT or watch the demo here on the website.


Querying Data at Source With Cribl Search

At the recent Security Field Day event, Cribl presented Cribl Search, a service included in Cribl Suite. Cribl Search allows users to query data in scattered addresses without having to move them. No matter where the data resides, Cribl Search lets users explore and investigate datasets in real time. Read about Cribl Search at Gestalt IT or watch the demo live on the website.


Embedding Security in the Code With Noname Security’s Active Testing V2

API security is front and center in cybersecurity, and integral to the future of APIs. Noname Security’s Active Testing v2 offers dynamic testing of APIs in shift left security, enabling organizations to infuse security deep within the code. By integrating security into the CI/CD processes, Active Testing v2 enables teams to proactively detect vulnerabilities and minimize the chances of API exploits. With its user-friendly interface and comprehensive testing capabilities, the solution empowers developers to embrace shift left security and ensure the early detection and mitigation of potential issues. Read about it at Gestalt IT or watch the demo live on the website.


Fast-Tracking Decision Making and Incident Response With Cisco’s Secure Network Analytics and XDR

The relentless onslaught of cyberattacks has made it amply clear that the appropriate countermeasure is a stringent routine of intelligently devised and religiously enforced practices. Cisco makes the path from observation to action short and speedy with Cisco Secure Network Analytics and the new Cisco XDR. Secure Network Analytics (SNA) serves as a collector and aggregator of network telemetry, providing broad security analytics, while XDR collects telemetry from various sources and analyzes it to identify threats and incidents. Together, these solutions streamline data processing, enhance threat detection, and enable prompt response, making high-security standards a priority. Read the review at Gestalt IT or watch the demo here at the website.


Designing a Lossless AI/ML Network With Cisco Data Center Networking Blueprint

Cisco presented the Cisco Data Center Networking Blueprint for AI/ML Applications, a detailed and instructive handbook on AI/ML network, at the recent Tech Field Day event. The document decodes the strict requirements of modern AI/ML workloads, and provides a blueprint for building a high-performing AI/ML network. Cisco’s Nexus 9000 Series switches offer high throughput, low latency, and congestion management features necessary for AI/ML applications, including RDMA over Converged Ethernet (RoCE) in network transport. Read about it at Gestalt IT or watch the presentation here at Tech Field Day.